https://cert-portal.siemens.com/productcert/html/ssa-976324.html <br/></td> CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"/>https://cert-portal.siemens.com/productcert/html/ssa-976324.html <br/></td> CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"/>
Access of Resource Using Incompatible Type ('Type Confusion') (CWE-843)
This vulnerability affects Siemens Simcenter Femap and allows remote attackers to execute arbitrary code. The specific flaw exists within the parsing of IGS files within the IGES_2022_2 executable. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. User interaction is required to exploit this vulnerability, as the target must visit a malicious page or open a malicious file.
An attacker can leverage this vulnerability to execute code in the context of the current process. This could lead to complete compromise of the affected system, potentially allowing unauthorized access to sensitive data, system modifications, or further lateral movement within the network. The vulnerability has high impacts on confidentiality, integrity, and availability of the affected system.
One proof-of-concept exploit is available on zerodayinitiative.com. There is no evidence of proof of exploitation at the moment.
Siemens has issued an update to correct this vulnerability. More details can be found at: https://cert-portal.siemens.com/productcert/html/ssa-976324.html
1. Apply the security update provided by Siemens as soon as possible. 2. Implement strict access controls and network segmentation to limit exposure of affected systems. 3. Educate users about the risks of visiting untrusted websites or opening suspicious files, especially on systems running Simcenter Femap. 4. Consider implementing application whitelisting to prevent unauthorized executables from running. 5. Regularly monitor systems for any signs of compromise or unusual activity.
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Feedly found the first article mentioning CVE-2024-32057. See article
Feedly estimated the CVSS score as HIGH
NVD published the first details for CVE-2024-32057
A CVSS base score of 7.8 has been assigned.
EPSS Score was set to: 0.04% (Percentile: 8.5%)